Completed
- Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Passkeys: What They Are, Why We Want Them, and How to Use Them
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction
- 2 - Authentication history
- 3 - Why Authenticator wasn't phishing resistant
- 4 - Need protection from social engineering
- 5 - Passkeys
- 6 - Built on PKI
- 7 - Passwordless FIDO2
- 8 - How this works
- 9 - Relying Party
- 10 - Client
- 11 - Authenticator
- 12 - Public and private keys
- 13 - Authentication flow
- 14 - Need for a user gesture and intent
- 15 - Presence and proximity
- 16 - The promise of the protocol
- 17 - Additional detail
- 18 - WebAuthn use
- 19 - Relying Party ID
- 20 - WebAuthn client checks
- 21 - Javascript and API calls
- 22 - Key benefits for protection
- 23 - Presence and CTAP
- 24 - Bluetooth use
- 25 - Cross-device authentication
- 26 - How many passkeys
- 27 - Authenticator options
- 28 - Types of passkey
- 29 - Authenticator can roam
- 30 - Where can passkeys be used
- 31 - What is different from before
- 32 - Using with Entra
- 33 - Enabling passkeys in Entra
- 34 - User passkey addition
- 35 - Using a passkey
- 36 - Using passkey on same device
- 37 - Cross-device authentication
- 38 - Microsoft accounts
- 39 - Always synced
- 40 - MSA passkey CDA demo
- 41 - Summary
- 42 - Close